2018
DOI: 10.1007/s11227-018-2538-8
|View full text |Cite
|
Sign up to set email alerts
|

Implementation of secret disclosure attack against two IoT lightweight authentication protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
8
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(8 citation statements)
references
References 41 publications
0
8
0
Order By: Relevance
“…However, Safkhani et al [ 29 ] discovered that the SecLAP protocol has a security vulnerability of secret disclosure, which allows an adversary to mount traceability and desynchronization attacks. Moreover, it is suggested that the ultralightweight operations such as the rotation, cross, and modular rotation functions do not converge to construct a secure protocol [ 29 , 30 ]. In the same year, Zhou et al [ 31 ] presented a quadratic residue-based RFID authentication protocol for TIMSs.…”
Section: Related Workmentioning
confidence: 99%
“…However, Safkhani et al [ 29 ] discovered that the SecLAP protocol has a security vulnerability of secret disclosure, which allows an adversary to mount traceability and desynchronization attacks. Moreover, it is suggested that the ultralightweight operations such as the rotation, cross, and modular rotation functions do not converge to construct a secure protocol [ 29 , 30 ]. In the same year, Zhou et al [ 31 ] presented a quadratic residue-based RFID authentication protocol for TIMSs.…”
Section: Related Workmentioning
confidence: 99%
“…Key Schedule. Suppose the key size is n, the key scheduling module is implemented by a permutation P T , which is P T = [9,15,8,13,10,14,12,11,0,1,2,3,4,5,6,7]. The content of 16 cells are replaced cell by cell according to the subscript rule indicated by P T , thereby executing key updating.…”
Section: Skinny Algorithmmentioning
confidence: 99%
“…Since ultra-lightweight protocols use only simple bit-wise operations, it is difficult to meet the security requirements. Furthermore, a large number of proposed ultra-lightweight protocols have been analyzed and attacked by other researchers [15], thus the use of relatively lightweight cryptographic algorithms to ensure the security certification of RFID systems is currently a research hotspot.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…However, Safkhani and Bagheri [63] cryptanalyzed this protocol and pointed out that it is vulnerable to secret disclosure attacks. Moreover, some researchers [61], [64] argued that ultra-lightweight operations can hardly construct a secure RFID protocol.…”
Section: Related Workmentioning
confidence: 99%